<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="http://feeds.feedblitz.com/feedblitz_rss.xslt"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0">
	<channel>
		<atom:link href="https://www.gdatasoftware.com/blogrss.xml" rel="self" type="application/rss+xml" />
		<title>G Data SecurityBlog (english)</title>
		<link>https://www.gdatasoftware.com/blog</link>
		<description>Security Blog</description>
		<language>de</language>
		
		<pubDate>Wed, 18 Feb 2026 07:38:51 +0100</pubDate>
		<lastBuildDate>Wed, 18 Feb 2026 07:38:51 +0100</lastBuildDate>
		
		<generator>G DATA CyberDefense AG</generator>
<image>
	<url>https://users.feedblitz.com/f3a77257c317a5341708a6bc585e8faa/Logo%202015%204C%20RGB.png</url>
	<title>G Data SecurityBlog (english)</title>
	<link>https://www.gdatasoftware.com/blog</link>
</image>
<meta xmlns="http://www.w3.org/1999/xhtml" name="robots" content="noindex" />
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2026/02/38370-malware-in-test-files</feedburner:origLink>
					<pubDate>Mon, 16 Feb 2026 11:23:00 +0100</pubDate>
					<title><![CDATA[Testing with live malware: Good Intentions, Problematic Execution]]></title>
					<link>https://feeds.feedblitz.com/~/947671952/0/gdatasecurityblog-en~Testing-with-live-malware-Good-Intentions-Problematic-Execution</link>
					<guid>https://blog.gdatasoftware.com/2026/02/38370-malware-in-test-files</guid>
					<description><![CDATA[Using AI to contain threats is a logical step in technological development. Testing countermeasures is also a good idea to ensure they work as intended. It becomes problematic, however, when real malware is used for testing.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/1/e/G_DATA_Blog_Malicious_TestFiles_Title_8430746246.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/1/e/G_DATA_Blog_Malicious_TestFiles_Title_8430746246.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/1/e/G_DATA_Blog_Malicious_TestFiles_Title_8430746246.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>Using AI to contain threats is a logical step in technological development. Testing countermeasures is also a good idea to ensure they work as intended. It becomes problematic, however, when real malware is used for testing.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671952/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/1/e/G_DATA_Blog_Malicious_TestFiles_Title_8430746246.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/1/e/G_DATA_Blog_Malicious_TestFiles_Title_8430746246.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671952/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2026/02/38368-open-claw-risks</feedburner:origLink>
					<pubDate>Thu, 12 Feb 2026 10:13:00 +0100</pubDate>
					<title><![CDATA[OpenClaw: Hit the ground running, with security lagging behind]]></title>
					<link>https://feeds.feedblitz.com/~/947671955/0/gdatasecurityblog-en~OpenClaw-Hit-the-ground-running-with-security-lagging-behind</link>
					<guid>https://blog.gdatasoftware.com/2026/02/38368-open-claw-risks</guid>
					<description><![CDATA[OpenClaw has cause quite the stir among AI enthusiasts during the past few weeks - and it has also been cause for a few more gray hairs among security experts. But what is the whole hoopla about with OpenClaw? <div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/d/1/G_DATA_Blog_OpenClaw_Title_188b6e7b49.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/d/1/G_DATA_Blog_OpenClaw_Title_188b6e7b49.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/d/1/G_DATA_Blog_OpenClaw_Title_188b6e7b49.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>OpenClaw has cause quite the stir among AI enthusiasts during the past few weeks - and it has also been cause for a few more gray hairs among security experts. But what is the whole hoopla about with OpenClaw?</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671955/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/d/1/G_DATA_Blog_OpenClaw_Title_188b6e7b49.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/d/1/G_DATA_Blog_OpenClaw_Title_188b6e7b49.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671955/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2026/02/38357-phishing-signal-messenger</feedburner:origLink>
					<pubDate>Mon, 09 Feb 2026 10:55:00 +0100</pubDate>
					<title><![CDATA[Officials sound the alarm: Phishing attacks on politicians, journalists via Signal messenger]]></title>
					<link>https://feeds.feedblitz.com/~/947671958/0/gdatasecurityblog-en~Officials-sound-the-alarm-Phishing-attacks-on-politicians-journalists-via-Signal-messenger</link>
					<guid>https://blog.gdatasoftware.com/2026/02/38357-phishing-signal-messenger</guid>
					<description><![CDATA[Attackers believed to be state-sponsored are currently attempting to take control of Signal accounts belonging to politicians, journalists, and other high-profile individuals in Germany and across Europe. In doing so, they pose, for example, as a Signal support chatbot.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/0/4/G_DATA_Blog_SignalPhishing_Title_463fc359bd.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/0/4/G_DATA_Blog_SignalPhishing_Title_463fc359bd.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/0/4/G_DATA_Blog_SignalPhishing_Title_463fc359bd.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>Attackers believed to be state-sponsored are currently attempting to take control of Signal accounts belonging to politicians, journalists, and other high-profile individuals in Germany and across Europe. In doing so, they pose, for example, as a Signal support chatbot.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671958/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/0/4/G_DATA_Blog_SignalPhishing_Title_463fc359bd.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/0/4/G_DATA_Blog_SignalPhishing_Title_463fc359bd.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671958/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2026/02/38355-mxdr-g-data-genuine-24-7-it-security-breisgau-hochschwarzwald-district-administration-office</feedburner:origLink>
					<pubDate>Fri, 06 Feb 2026 11:58:00 +0100</pubDate>
					<title><![CDATA[„With MXDR from G DATA, we have genuine 24/7 IT security at the Breisgau-Hochschwarzwald district administration office“]]></title>
					<link>https://feeds.feedblitz.com/~/947671961/0/gdatasecurityblog-en~%e2%80%9eWith-MXDR-from-G-DATA-we-have-genuine-IT-security-at-the-BreisgauHochschwarzwald-district-administration-office%e2%80%9c</link>
					<guid>https://blog.gdatasoftware.com/2026/02/38355-mxdr-g-data-genuine-24-7-it-security-breisgau-hochschwarzwald-district-administration-office</guid>
					<description><![CDATA[With Managed Extended Detection and Response (MXDR), the Breisgau-Hochschwarzwald district administration office protects its more than 2,000 clients and servers around the clock. In an interview, Manuel Seifer, IT administrator and responsible for technical IT security at the district administration office, explains what requirements were decisive in the choice of provider and why the cooperation with G DATA is convincing. In this interview, Manuel Seifer, IT administrator and responsible for technical IT security at the district administration office, explains which requirements were decisive in choosing a provider and why the collaboration with G DATA is so convincing.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/2/4/MXDR_Nightshift_MA-9299%40x2_a0049352d2.png" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/2/4/MXDR_Nightshift_MA-9299%40x2_a0049352d2.png"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/2/4/MXDR_Nightshift_MA-9299%40x2_a0049352d2.png" length="0" type="image/png" /><content:encoded><![CDATA[<p>With Managed Extended Detection and Response (MXDR), the Breisgau-Hochschwarzwald district administration office protects its more than 2,000 clients and servers around the clock. In an interview, Manuel Seifer, IT administrator and responsible for technical IT security at the district administration office, explains what requirements were decisive in the choice of provider and why the cooperation with G DATA is convincing. In this interview, Manuel Seifer, IT administrator and responsible for technical IT security at the district administration office, explains which requirements were decisive in choosing a provider and why the collaboration with G DATA is so convincing.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671961/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/2/4/MXDR_Nightshift_MA-9299%40x2_a0049352d2.png" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/2/4/MXDR_Nightshift_MA-9299%40x2_a0049352d2.png"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671961/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2026/01/38347-digital-independence</feedburner:origLink>
					<pubDate>Tue, 27 Jan 2026 13:37:00 +0100</pubDate>
					<title><![CDATA[Go European - but how? Finding alternatives for messengers, cloud service and others]]></title>
					<link>https://feeds.feedblitz.com/~/947671964/0/gdatasecurityblog-en~Go-European-but-how-Finding-alternatives-for-messengers-cloud-service-and-others</link>
					<guid>https://blog.gdatasoftware.com/2026/01/38347-digital-independence</guid>
					<description><![CDATA[Becoming less dependent on software and services from outside the EU has become a priority for businesses as well as public authorities. But even more and more private individuals ask themselves: "Is there something else than series from the US or China?" <div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/a/3/G_DATA_Blog_Digitale_Unabhaengigkeit_Title_ad347b55e9.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/a/3/G_DATA_Blog_Digitale_Unabhaengigkeit_Title_ad347b55e9.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/a/3/G_DATA_Blog_Digitale_Unabhaengigkeit_Title_ad347b55e9.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>Becoming less dependent on software and services from outside the EU has become a priority for businesses as well as public authorities. But even more and more private individuals ask themselves: "Is there something else than series from the US or China?"</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671964/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/a/3/G_DATA_Blog_Digitale_Unabhaengigkeit_Title_ad347b55e9.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/a/3/G_DATA_Blog_Digitale_Unabhaengigkeit_Title_ad347b55e9.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671964/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2025/11/38298-learning-about-browser-hijacking</feedburner:origLink>
					<pubDate>Wed, 10 Dec 2025 13:37:00 +0100</pubDate>
					<title><![CDATA[Browser Hijacking: Three Technique Studies]]></title>
					<link>https://feeds.feedblitz.com/~/947671967/0/gdatasecurityblog-en~Browser-Hijacking-Three-Technique-Studies</link>
					<guid>https://blog.gdatasoftware.com/2025/11/38298-learning-about-browser-hijacking</guid>
					<description><![CDATA[If you are searching for technical information on how browser hijacking works, some generic removal instructions is all you'll probably find. Let's change that.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/f/2/G_DATA_Blog_BrowserHijacking_Title_eea79a9553.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/f/2/G_DATA_Blog_BrowserHijacking_Title_eea79a9553.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/f/2/G_DATA_Blog_BrowserHijacking_Title_eea79a9553.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>If you are searching for technical information on how browser hijacking works, some generic removal instructions is all you'll probably find. Let's change that.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671967/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/f/2/G_DATA_Blog_BrowserHijacking_Title_eea79a9553.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/f/2/G_DATA_Blog_BrowserHijacking_Title_eea79a9553.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671967/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2025/12/38310-lumma-stealer-itchio-patreon</feedburner:origLink>
					<pubDate>Mon, 08 Dec 2025 13:37:00 +0100</pubDate>
					<title><![CDATA[Lumma Stealer: Danger lurking in fake game updates from itch.io and Patreon]]></title>
					<link>https://feeds.feedblitz.com/~/947671970/0/gdatasecurityblog-en~Lumma-Stealer-Danger-lurking-in-fake-game-updates-from-itchio-and-Patreon</link>
					<guid>https://blog.gdatasoftware.com/2025/12/38310-lumma-stealer-itchio-patreon</guid>
					<description><![CDATA[After patches on mainstream gaming platforms like Steam, indie game platforms as well as Patreon have become the latest platforms for distributing malware. <div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/1/3/G_DATA_Blog_LummaStealerPatreon_Title_8206d0ebc1.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/1/3/G_DATA_Blog_LummaStealerPatreon_Title_8206d0ebc1.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/1/3/G_DATA_Blog_LummaStealerPatreon_Title_8206d0ebc1.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>After patches on mainstream gaming platforms like Steam, indie game platforms as well as Patreon have become the latest platforms for distributing malware.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671970/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/1/3/G_DATA_Blog_LummaStealerPatreon_Title_8206d0ebc1.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/1/3/G_DATA_Blog_LummaStealerPatreon_Title_8206d0ebc1.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671970/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2025/12/38306-arkanix-stealer</feedburner:origLink>
					<pubDate>Mon, 01 Dec 2025 13:37:00 +0100</pubDate>
					<title><![CDATA[Arkanix Stealer: Newly discovered short term profit malware]]></title>
					<link>https://feeds.feedblitz.com/~/947671973/0/gdatasecurityblog-en~Arkanix-Stealer-Newly-discovered-short-term-profit-malware</link>
					<guid>https://blog.gdatasoftware.com/2025/12/38306-arkanix-stealer</guid>
					<description><![CDATA[Recently, we stumbled upon a new stealer named Arkanix. This stealer possibly belongs to the short-lived category of stealers which aim for short-term quick financial gains.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/0/e/G_DATA_Blog_Arkanix_Title_23a7f5fb45.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/0/e/G_DATA_Blog_Arkanix_Title_23a7f5fb45.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/0/e/G_DATA_Blog_Arkanix_Title_23a7f5fb45.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>Recently, we stumbled upon a new stealer named Arkanix. This stealer possibly belongs to the short-lived category of stealers which aim for short-term quick financial gains.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671973/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/0/e/G_DATA_Blog_Arkanix_Title_23a7f5fb45.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/0/e/G_DATA_Blog_Arkanix_Title_23a7f5fb45.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671973/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2025/11/38304-six-misconceptions-about-awareness-trainings</feedburner:origLink>
					<pubDate>Tue, 18 Nov 2025 09:30:00 +0100</pubDate>
					<title><![CDATA[Six Misconceptions About Awareness Trainings]]></title>
					<link>https://feeds.feedblitz.com/~/947671976/0/gdatasecurityblog-en~Six-Misconceptions-About-Awareness-Trainings</link>
					<guid>https://blog.gdatasoftware.com/2025/11/38304-six-misconceptions-about-awareness-trainings</guid>
					<description><![CDATA[Many spectacular data leaks and other security incidents can be traced back to an email that should never have been opened. Would these incidents have been prevented through security awareness trainings? Perhaps. Discussions on this topic often begin with the claim that such trainings are an expensive waste of time and ineffective. However, these reservations are often based on faulty assumptions and unrealistic expectations. Below, we have compiled the most common misconceptions.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/a/e/GDATA-CDA-Image-3-CMYK-300dpi_7a26855aca.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/a/e/GDATA-CDA-Image-3-CMYK-300dpi_7a26855aca.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/a/e/GDATA-CDA-Image-3-CMYK-300dpi_7a26855aca.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>Many spectacular data leaks and other security incidents can be traced back to an email that should never have been opened. Would these incidents have been prevented through security awareness trainings? Perhaps. Discussions on this topic often begin with the claim that such trainings are an expensive waste of time and ineffective. However, these reservations are often based on faulty assumptions and unrealistic expectations. Below, we have compiled the most common misconceptions.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671976/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/a/e/GDATA-CDA-Image-3-CMYK-300dpi_7a26855aca.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/a/e/GDATA-CDA-Image-3-CMYK-300dpi_7a26855aca.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671976/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://blog.gdatasoftware.com/2025/09/38265-steam-blockblasters-game-downloads-malware</feedburner:origLink>
					<pubDate>Mon, 22 Sep 2025 08:00:00 +0200</pubDate>
					<title><![CDATA[BlockBlasters: Infected Steam game downloads malware disguised as patch]]></title>
					<link>https://feeds.feedblitz.com/~/947671979/0/gdatasecurityblog-en~BlockBlasters-Infected-Steam-game-downloads-malware-disguised-as-patch</link>
					<guid>https://blog.gdatasoftware.com/2025/09/38265-steam-blockblasters-game-downloads-malware</guid>
					<description><![CDATA[A 2D platformer game called BlockBlasters has recently started showing signs of malicious activity after a patch release on August 30. While the user is playing the game, various bits of information are lifted from the PC the game is running on - including crypto wallet data. Hundreds of users are potentially affected. <div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/5/4/G_DATA_Blog_BloackBlasters_Title_6f7a2d210a.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/5/4/G_DATA_Blog_BloackBlasters_Title_6f7a2d210a.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/5/4/G_DATA_Blog_BloackBlasters_Title_6f7a2d210a.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>A 2D platformer game called BlockBlasters has recently started showing signs of malicious activity after a patch release on August 30. While the user is playing the game, various bits of information are lifted from the PC the game is running on - including crypto wallet data. Hundreds of users are potentially affected.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/947671979/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/5/4/G_DATA_Blog_BloackBlasters_Title_6f7a2d210a.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/5/4/G_DATA_Blog_BloackBlasters_Title_6f7a2d210a.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Post to X.com" href="https://feeds.feedblitz.com/_/24/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/x.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/947671979/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
</channel></rss>

